| Differential fault intensity analysis NF Ghalaty, B Yuce, M Taha, P Schaumont 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 49-58, 2014 | 175 | 2014 |
| Fault attacks on secure embedded software: Threats, design, and evaluation B Yuce, P Schaumont, M Witteman Journal of Hardware and Systems Security 2 (2), 111-130, 2018 | 130 | 2018 |
| Software fault resistance is futile: Effective single-glitch attacks B Yuce, NF Ghalaty, H Santapuri, C Deshpande, C Patrick, P Schaumont 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 47-58, 2016 | 84 | 2016 |
| Lightweight fault attack resistance in software using intra-instruction redundancy C Patrick, B Yuce, NF Ghalaty, P Schaumont International Conference on Selected Areas in Cryptography, 231-244, 2016 | 65 | 2016 |
| FAME: Fault-attack aware microprocessor extensions for hardware fault detection and software fault response B Yuce, NF Ghalaty, C Deshpande, C Patrick, L Nazhandali, ... Proceedings of the Hardware and Architectural Support for Security and …, 2016 | 52 | 2016 |
| Differential fault intensity analysis on PRESENT and LED block ciphers NF Ghalaty, B Yuce, P Schaumont International Workshop on Constructive Side-Channel Analysis and Secure …, 2015 | 47 | 2015 |
| TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks B Yuce, NF Ghalaty, P Schaumont 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 42 | 2015 |
| Fault-assisted side-channel analysis of masked implementations Y Yao, M Yang, C Patrick, B Yuce, P Schaumont 2018 IEEE international symposium on hardware oriented security and trust …, 2018 | 41 | 2018 |
| Improving fault attacks on embedded software using RISC pipeline characterization B Yuce, NF Ghalaty, P Schaumont 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 97-108, 2015 | 41 | 2015 |
| Inducing local timing fault through EM injection M Ghodrati, B Yuce, S Gujar, C Deshpande, L Nazhandali, P Schaumont Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 39 | 2018 |
| Analyzing the efficiency of biased-fault based attacks NF Ghalaty, B Yuce, P Schaumont IEEE Embedded Systems Letters 8 (2), 33-36, 2016 | 34 | 2016 |
| Fast and efficient circuit topologies forfinding the maximum of n k-bit numbers B Yuce, HF Ugurdag, S Gören, G Dündar IEEE Transactions on Computers 63 (8), 1868-1881, 2014 | 31 | 2014 |
| A configurable and lightweight timing monitor for fault attack detection C Deshpande, B Yuce, NF Ghalaty, D Ganta, P Schaumont, L Nazhandali 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 461-466, 2016 | 26 | 2016 |
| Employing dual-complementary flip-flops to detect EMFI attacks C Deshpande, B Yuce, L Nazhandali, P Schaumont 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 109-114, 2017 | 20 | 2017 |
| The future of real-time security: Latency-optimized lattice-based digital signatures A Aysu, B Yuce, P Schaumont ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-18, 2015 | 20 | 2015 |
| A secure exception mode for fault-attack-resistant processing B Yuce, C Deshpande, M Ghodrati, A Bendre, L Nazhandali, ... IEEE Transactions on Dependable and Secure Computing 16 (3), 388-401, 2018 | 19 | 2018 |
| A fast circuit topology for finding the maximum of N k-bit numbers B Yuce, HF Ugurdag, S Gören, G Dundar 2013 IEEE 21st Symposium on Computer Arithmetic, 59-66, 2013 | 15 | 2013 |
| Microprocessor fault detection and response system B Yuce, NF Ghalaty, PR Schaumont US Patent 10,452,493, 2019 | 14 | 2019 |
| Secure authentication with energy-harvesting: A multi-dimensional balancing act P Schaumont, B Yuce, K Pabbuleti, D Mane Sustainable Computing: Informatics and Systems 12, 83-95, 2016 | 12 | 2016 |
| Fast two-pick n2n round-robin arbiter circuit HF Ugurdag, F Temizkan, O Baskirt, B Yuce Electronics letters 48 (13), 759-760, 2012 | 12 | 2012 |